[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-power PDAs in public wireless LANs using two factors including a password and a token, e.g. a smart card. They claimed that their proposed scheme provided mutual authentication, identity privacy, half-forward secrecy and low computation cost for a client including just one symmetric key encryption and five hash operations. In this paper, we point out that Park et al.’s protocol is vulnerable to the dictionary attack upon identity privacy. We propose two schemes with mutual authentication, half-forward secrecy, lower computation cost and less exchanged messages than Park et al.’s protocol. In additional to these properties, identity privacy, whic...
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. propos...
is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange ...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]The password-authenticated key exchange (PAKE) is an important tool to secure wireless c...
[[abstract]]In a client-server network environment, a mutual authentication and key exchange scheme ...
[[abstract]]Recently, Zhu et al. proposed an password-based authenticated key exchange protocol base...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
With the advancement in Internet-based technologies, network applications are no longer just limited...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
Key agreements that use only password authentication are convenient in communication networks, but t...
1 Introduction Classical symmetric key based authenticated key exchange protocols dictate the shared...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encry...
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. propos...
is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange ...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]The password-authenticated key exchange (PAKE) is an important tool to secure wireless c...
[[abstract]]In a client-server network environment, a mutual authentication and key exchange scheme ...
[[abstract]]Recently, Zhu et al. proposed an password-based authenticated key exchange protocol base...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
With the advancement in Internet-based technologies, network applications are no longer just limited...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
Key agreements that use only password authentication are convenient in communication networks, but t...
1 Introduction Classical symmetric key based authenticated key exchange protocols dictate the shared...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encry...
This paper proposes a novel authentication protocol for wireless access security. Current symmetric ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor...